Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 22:52
Static task
static1
Behavioral task
behavioral1
Sample
8de3e75514da02111fa411f958145f31_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8de3e75514da02111fa411f958145f31_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8de3e75514da02111fa411f958145f31_JaffaCakes118.exe
-
Size
750KB
-
MD5
8de3e75514da02111fa411f958145f31
-
SHA1
55bef280b943a8e662463ec72948864625ddc0e5
-
SHA256
b67ded535bc11168ed03a3e4cb68c67570f50c4eb3b84dcf9e971092c9c58a3f
-
SHA512
a5f3dc8669cd8435c33661d3b07737f554379e629ea3b0c5f792cb3dc7b64ce36758428bf1aaa82dce6466148d655ceea41926dcfb1f0e50d828efd38fafb92e
-
SSDEEP
6144:xOc8GN4wU4sY4WZOHLqw6/DtwGe4G6Evwoe+wiMbxKF:x3tNlU/f76Evwoe+wiMbUF
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
7bcd7b5746ffd42f7ab0ebb5d27607aa
-
reg_key
7bcd7b5746ffd42f7ab0ebb5d27607aa
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2856 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 win..exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe Token: 33 2524 win..exe Token: SeIncBasePriorityPrivilege 2524 win..exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2524 3040 8de3e75514da02111fa411f958145f31_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2524 3040 8de3e75514da02111fa411f958145f31_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2524 3040 8de3e75514da02111fa411f958145f31_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2856 2524 win..exe 32 PID 2524 wrote to memory of 2856 2524 win..exe 32 PID 2524 wrote to memory of 2856 2524 win..exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8de3e75514da02111fa411f958145f31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8de3e75514da02111fa411f958145f31_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\win..exe"C:\Users\Admin\AppData\Local\Temp\win..exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\win..exe" "win..exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD58de3e75514da02111fa411f958145f31
SHA155bef280b943a8e662463ec72948864625ddc0e5
SHA256b67ded535bc11168ed03a3e4cb68c67570f50c4eb3b84dcf9e971092c9c58a3f
SHA512a5f3dc8669cd8435c33661d3b07737f554379e629ea3b0c5f792cb3dc7b64ce36758428bf1aaa82dce6466148d655ceea41926dcfb1f0e50d828efd38fafb92e